Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

eva

Results 376 - 400 of 2755Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
    
IBM
Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: Evariant     Published Date: Nov 14, 2016
Changing healthcare market forces, such as value-based care models, consolidation, and payer mix erosion, have propagated declining margins and fueled hyper-competition among healthcare organizations vying for market share. In this new world, determining effective patient engagement strategies has become paramount for hospitals and health systems as they strive to acquire, retain, and re-activate patients, and, ultimately, drive revenue. Now, more than ever, it is critical that healthcare organizations create and maintain positive, lasting relationships with their patients, both current and prospective, working to attract them into their network and keep them there.
Tags : 
healthcare crm, ehr, healthcare technology, marketing, patient acquisition, patient engagement
    
Evariant
Published By: Evariant     Published Date: Nov 08, 2018
Many healthcare executives initially looked to their HER/EMR systems and patient portals to engage patients. But these technologies are not the complete solution. This eBook explores what your enterprise tech stack needs to look like to properly find, guide and keep patients for life through meaningful engagement.
Tags : 
patient engagement, patient loyalty, patient retention, healthcare crm, electronic medical records
    
Evariant
Published By: Panorama     Published Date: Jan 22, 2014
To help organizations evaluate their Business Intelligence needs, Panorama Software has built a vendor agnostic multi-vendor evaluation work sheet. Organizations can rank as many vendors as they wish in a spread sheet that contains over 150 features. All data is then aggregated into a results sheet, displaying your top options.
Tags : 
panorama, business intelligence, bi vendors, free tools, bi matrix, intelligence, buyers guide, data management
    
Panorama
Published By: Data Stax     Published Date: Apr 27, 2012
This paper examines the growing prevalence of big data across nearly every industry. Download this white paper to find out more!
Tags : 
datastax, data stax, enterprise, big data, data management, enterprise applications
    
Data Stax
Published By: IBM     Published Date: Jan 14, 2015
Big data has been big news in recent years. Organizations recognize that they must now begin to focus on using big data technologies to solve business problems. The pressure is on for organizations to move past the discussion phase toward well-planned projects.
Tags : 
big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
IBM
Published By: RedPoint Global     Published Date: May 11, 2017
Practical perspectives on leveraging data to grow sales, cut costs, up-sell more effectively and make better decisions. Marketers overwhelmingly agree they have access to more than enough data. The problem is finding actionable ways to utilize data that is collected across all customer interaction points to better engage with customer and increase lifetime customer value. This white paper explores the relevance of big data for marketers: what they need to know and the steps they should take today to embrace data and analytics to position their organizations for success today.
Tags : 
customer retention, customer experience, real-time personalization, customer insights
    
RedPoint Global
Published By: Network Automation     Published Date: Dec 02, 2008
The way the business now views the IT group at BJ's Restaurants is working to everyone's advantage. In most restaurants, IT is generally viewed as a function of finance, where the prevailing ethos is keeping costs down.
Tags : 
network automation, network automation bpa server, process automation, networking, it management, network management, network performance management
    
Network Automation
Published By: Bazaarvoice     Published Date: Sep 21, 2016
The challenge for brands and retailers is clear. To win during the holiday shopping season, they must: • Plan holiday campaigns leveraging the very best data resources you can to inform messaging and targeting • Use the fragmented holiday shopping journey to their advantage – meeting shoppers in the moments that matter • Cut through the noise on Black Friday – and throughout holiday – to reach consumers with relevant, authentic messages that resonate
Tags : 
black friday, holiday shopping, holiday campaigns, customer messaging, customer targeting, holiday messaging strategy
    
Bazaarvoice
Published By: TIBCO Software     Published Date: Sep 16, 2019
Por años, los fabricantes han estado tratando de optimizar sus procesos y cadenas de suministro asociadas creando mercados, intercambios estandarizados, y sistemas monolíticos. En muchos casos, estas soluciones no logran su objetivo, lo que da origen a procesos fragmentados y frágiles, y en los que compartir datos es complicado. Blockchain, la tecnología que está detrás de Bitcoin y otras criptomonedas, puede resolver estos problemas. Compartir información mediante una red distribuida confiable con una lógica de negocio integrada ofrece muchos beneficios al sector manufacturero, especialmente cuando se combina con las comunidades de IoT y de IA. Vea este webinar titulado Blockchain y Manufactura: Una Manera Inteligente de Elevar la Eficiencia en las Cadenas de Suministro de Semiconductores y Electrónica, conducido por Nelson Petracek, director de Tecnología de TIBCO Software. Entre los temas que se abordan se incluye: • Blockchains empresariales • Casos de uso en el sector manufactur
Tags : 
    
TIBCO Software
Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix
Published By: SAS     Published Date: Jun 05, 2017
"The connected customer is an individual who is intimately connected to the data, outcomes, decisions and staff associated with any relationship to an organization.  To create personalized experiences, companies across all industries must pursue a more connected relationship with their customers through technology and processes focused on delivering relevant personalized experiences whenever possible. In this report, Blue Hill explores the key traits associated with supporting the connected customer through the internet of things, and provides guidance on why the internet of things will be essential across the general business landscape. "
Tags : 
    
SAS
Published By: Bluecore     Published Date: Sep 19, 2018
How Pura Vida uses Bluecore to improve email engagement, stay relevant with customers and drive revenue.
Tags : 
bluecore, pura, vida, customer, revenue
    
Bluecore
Published By: Bluecore     Published Date: Dec 14, 2018
A sampling of marketing campaigns launched by our retail customers that showcase the variety of ways you can engage consumers to create a truly relevant shopping experience.
Tags : 
    
Bluecore
Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
Published By: Workforce Software     Published Date: Feb 02, 2015
The Aberdeen Group has taken a fresh look at two very important questions: How does automating a total workforce management strategy elevate business performance? What types of measurable gains can you expect to achieve? If you want a thorough and persuasive argument for automating workforce management processes across the enterprise, this is a must-read.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor
    
Workforce Software
Published By: Workforce Software     Published Date: Nov 23, 2015
The Aberdeen Group has taken a fresh look at two very important questions: 1. How does automating a total workforce management strategy elevate business performance? 2. What types of measurable gains can you expect to achieve? If you want a thorough and persuasive argument for automating workforce management processes across the enterprise, this is a must-read.
Tags : 
workforce management strategy, automation, business performance
    
Workforce Software
Published By: Oracle     Published Date: Nov 05, 2013
The key is knowing your target audience and creating video content relevant to them. This paper provides some key insights into how you can maximize your video’s effectiveness in social streams.
Tags : 
branding, branded video posts, video posts, multimedia, engagement, audience targeting, video content, social media
    
Oracle
Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection
    
LifeLock
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: KPMG     Published Date: Jun 06, 2019
Traditional IT finance funding processes can no longer keep pace with fast-changing customer demands. Discover a more dynamic approach to funding technology and innovation – one that enables investing almost anytime and anywhere. Read this briefing to find out: • why funding must be uncoupled from the annual budgeting process • how the decentralisation of IT is shaping investment strategies • what a new approach to evaluating success should look like • how Technology Business Management can help.
Tags : 
    
KPMG
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.